Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable.

With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.

Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value

Join us for our follow-up webcast with a focus on Panorama and Networking enhancements to get a quick overview of software deployment, integration architecture and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value.

In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.

We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.

Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .

After the presentation, we will have some time for questions and answers with our experts.

In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse

The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

Join this webcast to learn:
- Vulnerabilities threat actors are now targeting most intensely
- New tactics and techniques hackers are using against endpoints
- Best practices Palo Alto Networks uses to secure its own endpoints

Your user population consists of employees and contractors using a wide variety of corporate and BYOD devices. Getting your BYOD strategy into place requires providing the right types of access to each platform. New features with GlobalProtect can help you address BYOD.

In this session, learn about the new Clientless VPN technology in GlobalProtect, and how it can be incorporated into your architecture. Find out about new integrations with mobile device management products such as AirWatch and MobileIron in order to secure traffic, control access to applications and protect data. Get an overview of the technology and see demonstrations of how it works.

Your user population consists of employees and contractors using a wide variety of corporate and BYOD devices. Getting your BYOD strategy into place requires providing the right types of access to each platform. New features with GlobalProtect can help you address BYOD.

In this session, learn about the new Clientless VPN technology in GlobalProtect, and how it can be incorporated into your architecture. Find out about new integrations with mobile device management products such as AirWatch and MobileIron in order to secure traffic, control access to applications and protect data. Get an overview of the technology and see demonstrations of how it works.

Watch this webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

•How it effectively prevent attacks against exploits and malware – such as ransomware
•An overview of the unique approach Traps takes to endpoint security
•How legacy antivirus is no longer effective enough
•How Traps can replace your existing legacy antivirus software
Included in this live webinar will be a live demonstration of Traps in action.

The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements.

We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.

Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market.

New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.

The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately.

Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivaled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable. With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.

You’ve heard the hype, now see for yourself the innovations that PAN-OS 8.0 brings to your network security. Attend this 30 minute webcast, “Start Benefiting from 8.0 Now,” to get a quick overview of the new features and enhancements PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:

•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course and VM-100 - $800 value

Reserve your spot now, so you can start to take advantage of all 8.0 has to offer.

The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.

This webinar will focus on:

- Vulnerabilities threat actors are now targeting most intensely
- New tactics and techniques hackers are using against endpoints
- Best practices Palo Alto Networks uses to secure its own endpoints

This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

In this presentation, our Unit 42 Threat Intelligence team will show you:
• How credential theft and abuse were used in real world attacks
• Demonstration of tools attackers use to capture credentials.
• How attackers buy and sell credentials on the dark web to further their criminal operations.

This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

In this presentation, our Unit 42 Threat Intelligence team will show you:
• How credential theft and abuse were used in real world attacks
• Demonstration of tools attackers use to capture credentials.
• How attackers buy and sell credentials on the dark web to further their criminal operations.

Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

In this session, get details on:
* Why the platform plays a critical role towards disrupting credential-based attacks
* Preventing the theft of credentials, using new PAN-OS 8.0 technologies
* Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0

Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

In this session, get details on:
* Why the platform plays a critical role towards disrupting credential-based attacks
* Preventing the theft of credentials, using new PAN-OS 8.0 technologies
* Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.